Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hypothetically, you are supposed to hack a system, how would you do it?
Home
Ethical Hacking
Hypothetically, you are supposed to hack a system, how would you do it?
+1
vote
asked
May 17, 2021
in
Ethical Hacking
by
Robindeniel
Hypothetically, you are supposed to hack a system, how would you do it?
hacking
hack-system
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
May 17, 2021
by
Robindeniel
The process of hacking any computer network or system includes –
Reconnaissance – The first step taken by a hacker is identifying the target and fetching information as much information they could.
Scanning – The next step is examining the victim by exploiting the information gathered during reconnaissance, using automated tools like port scanners, mappers, or vulnerability scanners.
Gaining access: This initiates the process of hacking, where the collected information helps to gain access to the computer network or system.
Maintaining access: The hacker now would like to access repetitively, and thus need to secure it through backdoors, rootkits, and Trojans.
Covering tracks: To avoid detection and any legal action, hackers erase the tracks that may lead to investigators tracing them.
Related questions
+1
vote
Q: What is a Pharming attack and how to prevent it?
asked
May 16, 2021
in
Ethical Hacking
by
rajeshsharma
pharming-attack
hacking
+1
vote
Q: What is MAC flooding and how to prevent it?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
mac-flooding
mac
hacking
+1
vote
Q: What is a DDoS attack and how does it work?
asked
May 16, 2021
in
Ethical Hacking
by
rajeshsharma
ddos-attacks
attacks
hacking
+1
vote
Q: What do you mean by exploitation?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
exploitation
hacking
+1
vote
Q: What do you mean by Trojan and explain its types?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
trojan
hacking
+1
vote
Q: What do you mean by keystroke logging?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
keystroke-log
logging
hacking
+1
vote
Q: Can you protect yourself from being hacked? How?
asked
May 17, 2021
in
Ethical Hacking
by
Robindeniel
hacking
protect
ethical
+1
vote
Q: What are the different types of sniffing?
asked
May 18, 2021
in
Ethical Hacking
by
Robindeniel
#sniffing-types
sniffing
hacking
+1
vote
Q: What are the disadvantages of Ethical Hacking?
asked
May 17, 2021
in
Ethical Hacking
by
Robindeniel
hacking-disadvantages
hacking
drawback-hacking
+1
vote
Q: What is footprinting? What are the different techniques of footprinting?
asked
May 17, 2021
in
Ethical Hacking
by
Robindeniel
footprinting
foot-print
hacking
...